Answer:
The options are
A. bolo. B. hole C. rake. D. shovel.
The answer is D. Shovel
Explanation:
The most suitable option is a Shovel which can be used to collect the animal manure from the grounds.
Using a shovel will make the job easier as a result of its very firm handle to lift the manure appropriately and also the curved base to enable proper transfer of the manure from the soil to where it’s needed.
The name of the tool which is used to collect the animal manure from the grounds is:
D. ShovelAccording to the complete question, we can see that there are a variety of options to select from that would be most suitable for a farmer to collect manure from the ground.
As a result of this, the name of the farm tool which is used to collect animal manure from the grounds is a shovel.
This is because, a shovel has a long handle and a curved base which can be used to pack things off the ground and it is especially useful in the farm when packing animal manure.
Therefore, the correct answer is option D
Read more here:
https://brainly.com/question/22488611
What framework uses CSS to access and manipulate HTML elements?
____ uses CSS to access and manipulate HTML elements
Answer:
The correct answer is JQuery
Explanation:
JQuery uses CSS to access and manipulate HTML elements.
Answer:
the answer is:
JQuery
The literals in the following statement are Blank 1 and Blank 2.
a = 3.14*r*r/2;
who here has a crush on jk from bts but feels more mature than him
Answer:
Nope not K-pop fan
Explanation:
Read a list of PowerPoint tasks.
Creating a new presentation
Opening a saved presentation
Printing a presentation
Saving a presentation
Which parts of PowerPoint can help to complete all the tasks on the list? Check all that apply.
ribbon
Status bar
Backstage view
Windows control
Quick Access toolbar
Answer:
ribbon
Backstage view
Quick Access toolbar
Explanation:
Write the interface (.h file) of a class Player containing: A data member name of type string. A data member score of type int.A member function called setName that accepts a parameter and assigns it to name . The function returns no value.
A member function called setScore that accepts a parameter and assigns it to score . The function returns no value.
A member function called getName that accepts no parameters and returns the value of name .
A member function called getScore that accepts no parameters and returns the value of score .
My start code:
class Player
{
string name;
int score;
void setScore (int playerScore)
{
score = playerScore;
}
int getScore()
{
return score;
}
}
Answer:
Following are the class definition to this question:
class Player//defining a Player class
{
private://use access specifier
string name;//defining string variable
int score;//defining integer variabl
public://use access specifier
void setName(string par_name);//declaring the setName method with one string parameter
void setScore(int par_score);//declaring the setScore method with one integer parameter
string getName();//declaring string method getName
int getScore();//declaring integer method getScore
};
Explanation:
In the above-given code, a Player class is defined, that hold a method and the variable which can be defined as follows:
It uses two access specifier, that are public and private. In private, a string and an integer variable "name, score" is declared, which holds their respective value. In public, it declares the get and set method, which holds the value from its parameters.please tell fast plzzzzzz
Answer:
heyyy
your answer is false
HOPE IT HELPS YOU OUT PLEASE MARK IT AS BRAINLIEST AND FOLLOW ME PROMISE YOU TO FOLLOW BACK ON BRAINLY.IN
Answer:
false..................
why do we need the system requirements for Adobe photoshop?
Why should you try to contact the technical support staff of a web hosting provider before you become one of its customers?
Answer: Contacting technical support can give you a general idea of the responsiveness of the web host provider to issues and problems. If the technical support staff is slow getting back to you at this point, don't be surprised if you get the same type of service when you have a problem and need immediate help. While not fail-safe, a quick response to a simple question at least gives the appearance of a well-organized, professional, and responsive technical support staff.
Select the correct text in the passage.
Which statement in the paragraph indicates that a data storage problem exists with an enterprise system?
[Once implemented, enterprise systems have a lifespan of 10 to 20 years. After that, organizations can upgrade them or scale them up.] Although this seems like a long time, [data within organizations accumulates exponentially and may be too difficult to manage and store on a single software system.] [Data overflow and a subsequent slowdown in one department will have a ripple effect on other functions of an organization. ]This affects the performance of the entire system.
its C, sorry if im wrong but im pretty sure.
Explanation:
Answer:data within organizations accumulates exponentially and may be too difficult to manage and store on a single software system.
Explanation:
A. Write a class that declares a variable named inches that holds a length in inches,
and assign a value. Display the value in feet and inches; for example, 86 inches
becomes 7 feet and 2 inches. Be sure to use a named constant where appropriate.
Save the class as InchesToFeet.java.
B. Write an interactive version of the InchesToFeet class that accepts the inches
value from a user. Save the class as InchesToFeetInteractive.java.
Answer:
A.
public class Main{
public static void main(String[] args) {
final int divisor = 12;
int inches = 86 ,feet;
feet =inches/divisor;
inches = inches%divisor;
System.out.print(feet+" feets "+inches+" inches");
}
}
B.
import java.util.*;
public class InchesToFeetInteractive{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
final int divisor = 12;
int inches,feet;
System.out.print("Measurement in Inches: ");
inches = input.nextInt();
feet =inches/divisor;
inches = inches%divisor;
System.out.print(feet+" feets "+inches+" inches");
}
}
Explanation:
Both classes use the same algorithm; however, the slight difference is that
(A) assumes a values of inch measure while (B) prompts user for input
That is show in the differences below
A)
int inches = 86 ,feet; ---> This initializes inches to 86;
B)
This prompts user for measurement in Inches
System.out.print("Measurement in Inches: ");
This gets the measurement
inches = input.nextInt();
The next lines are common in both classes
This declares and initializes a constant which is used in the conversion
final int divisor = 12;
This calculates the number of feet in the user input
feet =inches/divisor;
This gets the remainder inches, if any. It uses % to calculate the remainder
inches = inches%divisor;
This prints the required output
System.out.print(feet+" feets "+inches+" inches");
Clay wants to print T-shirts and sell them online. What printing press would be the best for him to use?
Answer:
I think is screen printing press.
Explanation:
Screen printing requires you to go through a multi-step, back-breaking process to print your t-shirt.
please tell fast plzzzzzzz
Answer:
True
Explanation:
I just check on my computer
Answer:
True
Explanation:
u use this to do the symbols liek the at symbole or dollar sign. just to name a few
help ma??!! please please
hey what do you need help with?
give us a picture and we will try to help.
Two of the most popular web servers are Apache and Microsoft IIS. Discuss some of the tools and techniques used to secure these web servers.
Answer:
Answered below
Explanation:
Various tools and techniques are used to secure web servers and they include;
- Network firewalls which are systems used to prevent unauthorized access to a server from external networks.
- Antiphishing tools used to prevent phishing.
- Encryption tools which use cryptography to encode sensitive data.
- Penetration testing softwares are used to test the vulnerability of network security.
- Antivirus softwares.
What is the importance of internet safety?
Answer:
1. Identity theft
2. Safety for you and your family and personal info
3. Harrasement and bullying prevention
Some things never to share on the internet with strangers...
1. Full name
2. Birthday
3. State or city of home
4. Pictures of yourself
5. Personal info about you or your family members
6. Personal social media links and tags
Explanation:
hOPE THIS HELPS!! I think some people need a reminder of this sometimes! you didnt give any options so i hope this helps you!
Write a statement that takes a variable named open_file that contains a file object and reads the next 12 characters into a variable named description.
Answer:
description=open_file.read(12)
Explanation:
A programming language in computer is a set formal languages that comprises a set of instruction which produce various kinds of output. It is used ti implement algorithms in computer programming.
In the context, description=open_file.read(12) is the statement given to the computer as input which takes a variable named as open_file containing a file object and which reads the next 12 characters into the variable named as description.
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ______________ programming.
Answer:
Visual.
Explanation:
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called visual programming.
A visual programming language is also commonly referred to as graphics user interface builder (GUI builder) and can be defined as a programming tool that avails programmers the ability to develop software programs (applications) using graphical elements and figures rather than texts alone.
Some examples of visual programming language are executable UML, Blockly, Kodu, Alice, Lego mindstorms, Gamemakers etc.
What is the best definition of a network?
Answer:
like tv or wifi
Explanation:
Your classmate constructs a simple computer that adds numbers. There are 5 wires for inputting the first
number, and the wires are currently "on","on", "off, "on", "off", or 11010 in binary.
What decimal number does that represent?
Answer:
26
Explanation:
A network technician has made a UTP cable that is terminated as T586A on one end and T586B on the opposite end. What type of cable has been constructed?
Answer:
CROSSOVER CABLEExplanation:
Crossover Cable is used to connect same types of device.
Crossover Cable is very similar to straight-through, except that they have pair of
wires that crisscross. This allows the two devices to communicate at the same
time.
TIA/EIA 568A: White/Green-Green, White/Orange-Blue, White/Blue-Orange,
White/Brown-Brown
TIA/EIA 568B: White/Orange-Orange, White/Green-Blue, White/Blue-Green,
White/Brown-Brown
On tool hackers use to get sensitive information from victims is/are:
A. Loggerware
B. Keyloggers
C. Robots
D. Phishing
please choose odd one out please tell fast
Answer:
cpu
Explanation:
Answer:
CPU bc A-Z is the first to the last also with the one digit numbers 0-9 so there for there is no connection with CPU as the other ones.
Explanation:
Hoped I helped have an amazing day. Please consider marking this brainliest thank you in advanced if you do!
Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.
Answer:
int miles[4] = {1, 5, 9, 22};
Explanation:
Given:
Initialized values = 1, 5, 9, and 22
Find:
Defines an array of four integers
Computation:
int miles[4] = {1, 5, 9, 22};
Which button in the Sort & Filter gallery of the Data tab would alphabetize from A to Z quickly?
Sort
AZ down arrow
AZ up arrow
Filter
Answer:
B AZ down arrow
Explanation:
got it right
Answer:
B. AZ down arrow
Explanation:
I'ts right on Edge
Have a good day!!!
Provide an example where a company has demonetized a market or industry.
ATTENTION MODERATORS
User "69PierNeedsAnswers69" has been spamming the same message on multiple questions, likely point farming. I request that you time him out as soon as possible.
Link to his profile: https://brainly.com/app/profile/27562423
Answer: lol
Explanation:
Create a query that shows columns employee last name, job title and hire date for those employees who joined the company on or after the first day of December 2016. Do not display job title of stock clerk. Show records in descending order by job title (Z to A).
Answer:
SELECT last_name, job_title, hire_date FROM employee WHERE hire_date>="01-12-2016" AND job_title != "STOCK CLERK" ORDER BY job_title DESC;
Explanation:
The SQL code queries the employee table returning records of the last_name, job_title, and hire_date columns matching the employees hired on or after December 2016 and job titles that are not stock clerks in the employee table.
The WHERE and AND clause is responsible for the condition while the ORDER BY clause returns the query result in the of the job title in descending order.
Why is it important to turn your work in on time? How does submitting your work on time demonstrate academic integrity? How do you plan to ensure your academic success by turning your work in on time?
Answer:
It is important to turn the work on time for two fundamental reasons: first, because it allows the student to organize their time more efficiently, without delays in his presentations; and second, because it shows the responsibility of the student in front of his obligations, which gives a positive concept in front of teachers and managers.
In addition, the delivery of work in a timely manner is a clear sample of academic integrity: it shows that the student has his academic career as his main priority, over other alternatives such as work or leisure. That is, it realizes that the student is applied and integral when considering his academic responsibilities.
In my case, I seek to ensure my academic success by submitting my work in advance, which gives me time to receive corrections from the teachers and to be able to modify my mistakes.
Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet?
a. 228 = 268 subnets, 24 -2 = 14 hosts per subnetwork
b. 24 = 16 subnets, 228 - 2 = 268E6 hosts per subnetwork
c. 24 - 2 = 14 subnets, 24 = 16 hosts per subnetwork
d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork
Answer:
d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork
Explanation:
When four bits are borrowed from the fourth octet of class C IP address 200.245.10.150, the IP address is subnetted to 16 subnets, where the number of subnets is equal to two raised to the number of borrowed bits (ie, 2^ number of borrowed bits), and 14 assignable host IP address gotten from the formula;
= 2^(number of host bits in the fourth octet) - 2
= (2^4) - 2
= 16 - 2 = 14 host addresses
The the concept of plug-and-play is demonstrated by which of the following scenarios
Answer:
What are the Scenarios
I will update this when you give us them
Explanation:
Answer: Farrah has completed a post-secondary education program and is now ready to begin working, without additional training, on her first day.
Explanation: